13-Oct-2012 Security related parts and Vehicle Interfaces

Size: px
Start display at page:

Download "13-Oct-2012 Security related parts and Vehicle Interfaces"

Transcription

1 13-Oct-2012 Security related parts and Vehicle Interfaces Robert Beckmann President Beckmann Technologies & BlueLink Diagnostic Solutions Member NASTF VSC

2 First generation security systems Simple signal exchange with key Fixed Resistors Infrared RF Transponder Bi-Directional Release immobilizer in PCM START Key Inserted

3 Modern high security systems No limits on networked components Simply a mouse click to add security func. Security Codes Key Inserted PCM Steering Unlocked Security Codes Transmission BCM Security Codes Security Codes START

4 Modern security systems, GM Global A 10+ ECUs With Security Functions

5 Typical Security parts Locked to immo-codes Shifter Interlock Ignition Switch Instrumentation PIN CODES Steering Locks Engine Management

6 A-Typical Security parts Any mismatched parts? Security is creeping into many parts!

7 A-Typical Security parts Locked to particular vehicle VIN codes Sensing and Diagnostic Modules, BCMs Headlights really? Automatic Transmission with integrated TCU HVAC Telematics

8 How will this trend impact our businesses? Using parts from a donor vehicle will no longer be possible. Parts can lock themselves making them useless. Higher costs to industry due to lack of recycled or remanufactured options. Lower payments to insurers because of lower value on salvage.

9 Mercedes Security Parts Policy available with LSID: 24hr emergency key request MY and up only Electronic ignition lock Electronic workshop key (green/orange) Electronic infrared control unit Electronic selector lever module (Model 215, 220, 230 only) Electronic steering lock.

10 Mercedes Security Parts Not Available: Any vehicle key ML AAM/EAM (Body Control Modules) Gear control unit from NAG2 (722.9 only) Repair Kit for Gear control unit from NAG2 (722.9 only) But anyone can buy a complete transmission Airbag squib wire pigtail (Dealers don t understand) Often any part which requires a VIN. Dealer interpretation of policy.

11 BMW Security Parts Policy: 6/29/2009 Thank you for your recent NASTF information request. The BMW Group supports the rights of owners to have the choice to decide where and how to have their BMW Group vehicles repaired and serviced. However, due to our commitment to safeguard the security of our owners vehicles we are unable to provide the parts you have requested. Vehicle Security Team BMW of North America, LLC (on behalf of the BMW Group)

12 BMW Security Parts Policy: ISPs report hit or miss being denied parts sales, left up to the local dealer. No consistent or public policy.

13 BMW Security Parts Programming: Majority of parts can be programmed using BMWs online diagnostic application using a J2534 vehicle interface. No key or other security data available to aftermarket under any circumstances.

14 Porsche [VW] Security Parts Policy: Porsche does not restrict the sales of any security related components. Security related parts and keys can be programmed via a standard J2534 interface. Andrew Lennon Porsche Cars of North America 3/23/2012

15 Two Types of Security Systems How are they programmed? Early systems. Simple embedded PIN codes Modern systems. Complex RSA/DES encryption software

16 Early security systems Simple signal exchange with key Fixed Resistors Infrared RF Transponder Bi-Directional Release immobilizer in PCM

17 How are keys produced, and parts initialized?

18 Simple embedded PIN code Nissan used as an example Scan tool or PC/VCI Code (Hack or Legit via SDRM) Blank Key or Fob UNLOCK CODES PCM/BCM ANY BLANK KEY IS LEARNED

19 Simple embedded PIN code Summary PIN code usually stored digitally (hidden) in vehicle. Security easily compromised. Unaware of any systems that have not been. Legitimate businesses funding hackers.

20 Simple embedded PIN code Pros/Cons PROS: Simple to program Blank keys generally available Codes can be obtained via SDRM CONS: Easily compromised

21 High Security System Vehicle is manufactured with unique random encrypted key codes. Initially just 8 keys but then more than 32. Limits number of keys which could be issued. Private key data is archived and maintained by Manufacturer only. Secure Database

22 High Security System Not simple PIN codes. Much more difficult to compromise. Uses DES public/private key encryption software like banks.

23 High Security System Pros/Cons PROS: Vehicles are much more secure But are still getting stolen CONS: Limited number of keys Must rely solely on manufacturer for entire life of vehicle Manufacturer ALONE has control of this data. Great right, remember SAAB?

24 High Security System Making keys, option #1: Ton of cash Data Secret Location Frustrated customer, up to 84 hour delay worst case! Eternity

25 High Security System Making keys, option #2: Secure, traceable transaction, over internet Data SDRM Key programmed in car Happy Customer 24/7/365

26 Porsche [VW] Security Parts Programming Provides unrestricted traceable access to security programming of keys and emissions-related ECUs. Porsche AG

27 High Security System Option #1: Inconvenient Expensive for OEM, dealers, and consumers Impossible to maintain 24/7/365 service 24hr key delivery not possible in many cases Security flaws since key is plug and play Option #2: 24/7/365 service possible nearly everywhere Small investment for vehicle security professionals Significant cost savings to OEM, no FEDEX OE revenue source from SDRM transactions Traceability for law enforcement via SDRM

28 The importance of the SDRM Ever expanding security functions in a-typical parts. Must expand mission of NASTF Vehicle Security Committee to address theft related parts restrictions by some manufacturers such as Mercedes and BMW. Get your Locksmith ID to support the work on the SDRM! Don t start this process with a car waiting in the bay! It can take 2 4 weeks to process your application.

29 Questions about the SDRM Question: I need to get an insurance bond. Answer: You only need a bond if you wish to get an LSID for one of your employees. Your declarations page from your business insurance policy is adequate for you as the business owner to obtain an lsid.

30 Questions about the SDRM Question: If my state requires a locksmiths license for locksmiths I need to get one for my shop. Answer: If you are a Vehicle Service Professional you do not need a locksmith license. BUT if your state requires you to be certified or licensed as a VSP you do need this license.

31 Goal of the SDRM and the VSC VSC Mission: The NASTF Vehicle Security Committee will facilitate the identification, prioritization, and correction of gaps in accessibility to vehicle security system information, and tools, while maintaining the security and integrity of vehicle anti-theft systems My personal goals: Provide a legitimate and traceable means of delivering and tracking security information needed to perform security related programming of service parts to facilitate vehicle repair, and provide a 24/7/365 means of supplying security solutions to a stranded motorist.

32 The cat and mouse game Automotive manufacturers pressured to more positively secure vehicles by insurance industry and consumer demands. Hackers are funded by legitimate users of security circumvention technology since other affordable options are often unavailable. Adding security technology to a-typical parts causes long term problems which are not adequately being addressed by our industry today. Who wins and who loses, and what are the long term effects?

33 The cat and mouse game Lack of legitimate tools funds hackers Typical non-oe automotive security tools.

34 Solutions Provide legitimate OE supported means of programming keys and security parts using SDRM/LSID, J2534, and online connectivity. De-Fund a community of hackers by doing so. Manufacturers save money by NOT having to support a costly 24/7/365 infrastructure. Less tool obsolescence - Long term vehicle serviceability Lower long term legacy costs to a manufacturer

35 Conclusions Be on guard when dealing with security enabled parts. Encourage vehicle manufacturers to develop security key and parts programming software which embraces the SDRM and standardized vehicle interfaces. Support NASTF! We are constantly looking for motivated individuals willing to help. Questions?

36 Thank you for attending this discussion!

Options for collision shops to perform scan services independently

Options for collision shops to perform scan services independently Scan Tool and Services Overview for Pre-and Post-scanning Overview: Pre-and Post-scanning solutions available today for collision diagnostics vary widely for applications and capabilities. Some tools or

More information

Connected vehicle cloud

Connected vehicle cloud Connected vehicle cloud Commercial presentation 2018.05.17 Ericsson Connected Vehicle Cloud Commercial Presentation 2018-05-17 Page 1 The evolution of the automotive industry 2017 2020 2025 2030 A vehicle

More information

Connected vehicle cloud Commercial presentation

Connected vehicle cloud Commercial presentation Connected vehicle cloud 17.1 Commercial presentation 2017.07.01 The evolution of the automotive industry 2017 2020 2025 2030 A vehicle can generate 1 GB of data per second By 2020 automakers could make

More information

How to make Connected Car Reality? Dr. Walter J. Buga CEO

How to make Connected Car Reality? Dr. Walter J. Buga CEO How to make Connected Car Reality? Dr. Walter J. Buga CEO 1 Connected Transportation Source: US DOT, January 2012 Core System Communications 1.3 Connected Vehicle Playing Field From a system perspective

More information

Thank you for your purchase.

Thank you for your purchase. Thank you for your purchase. Please read and understand the complete installation instructions before attempting to install this simple wire-in product. If not installed properly, LaunchMAX will not function

More information

The 10 Disaster Planning Essentials For A Small Business Network

The 10 Disaster Planning Essentials For A Small Business Network The 10 Disaster Planning Essentials For A Small Business Network If your data is important to your business and you cannot afford to have your operations halted for days or even weeks due to data loss

More information

10 IDN-INC.CA. Key Programming System. MVP PRO Programming Token Packages. Key Programing System & Tokens

10 IDN-INC.CA. Key Programming System. MVP PRO Programming Token Packages. Key Programing System & Tokens Key Programing System & Tokens Key Programming System Innovative PY S YOU GO roadside key programming Free software* - updates are downloadable *(except DS190 & 198SD) dvanced technology designed with

More information

February.18. Abrites Diagnostics for BMW/ Mini version User Manual. Abrites Diagnostics for BMW/Mini version User Manual 1.

February.18. Abrites Diagnostics for BMW/ Mini version User Manual. Abrites Diagnostics for BMW/Mini version User Manual 1. Abrites Diagnostics for BMW/Mini version 28.0 1 List of revisions Date Chapter Description Revision 00. ALL Document created 1.0 18.02. ALL Document created 1. Introduction...3 2. Installation...3 3. Using

More information

PURPOSE BULLETIN CONTENTS AFFECTED VEHICLES BACKGROUND INFORMATION

PURPOSE BULLETIN CONTENTS AFFECTED VEHICLES BACKGROUND INFORMATION Page 1 of 10 SUBJECT: SYSTEM INFORMATION UPDATE (2005 MODELS) No: DATE: June, 2005 MODEL: See Below CIRCULATE TO: [X] GENERAL MANAGER [X] PARTS MANAGER [X] TECHNICIAN [X] SERVICE ADVISOR [X] SERVICE MANAGER

More information

OE & Aftermarket Cooperation

OE & Aftermarket Cooperation OE & Aftermarket Cooperation Tools & Information Donny Seyfer AAM A little background Co-Owner Seyfer Automotive 1 of 4 ASE Master L1 techs in my shop NASTF T&E Co-chair Teach 15-20 Service Information/IT

More information

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats

More information

SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION

SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION Introduction Why static passwords are insufficient Introducing two-factor Authentication Form Factors for OTP delivery Contact information OTP generating

More information

The Fully Networked Car. Trends in Car Communication. Geneva March 2, 2005

The Fully Networked Car. Trends in Car Communication. Geneva March 2, 2005 The Fully Networked Car Trends in Car Communication Geneva March 2, 2005 Is The Connected Car Really A Major Business Opportunity? 2 Are We Flushing Money Away Having No Convincing Customer Benefits? 3

More information

Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security

Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security In less than a year, 100s of millions connected cars Aftermarket connectivity most prevalent

More information

Introduction. Read on and learn some facts about backup and recovery that could protect your small business.

Introduction. Read on and learn some facts about backup and recovery that could protect your small business. Introduction No business can afford to lose vital company information. Small-business owners in particular must take steps to ensure that client and vendor files, company financial data and employee records

More information

2008 (PM) Caliber SRT4

2008 (PM) Caliber SRT4 Dealer Service Instructions for: Emissions Recall H32 Reprogram PCM OBD Monitors October 2008 Effective immediately, all repairs on involved vehicles are to be performed according to this notification.

More information

The BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO

The BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO The BUSINESS of Fraud. Don t let it put you out of business. Veenindra J. Singh, First Vice President, Treasury Management Consultant California Bank & Trust 300 Lakeside Drive, Suite 800 Oakland, Ca 94612

More information

Securing the future of mobility

Securing the future of mobility Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need

More information

mobridge Audio ipod Install Notes

mobridge Audio ipod Install Notes mobridge Audio ipod Install Notes For use with the mobridge Audio ipod range of products mobridge Audio ipod Install Notes... 1 Common Install Notes... 3 mobridge Wiring Connection... 5 mobridge Audio

More information

Zed-FULL- Immobiliser Solutions by IEA

Zed-FULL- Immobiliser Solutions by IEA Zed-FULL- Immobiliser Solutions by IEA Zed Full is the most professional and the unique all in one immobiliser device in the world with these features; Fix and crypto transponder cloning, Remote cloning

More information

Connect Vehicles: A Security Throwback

Connect Vehicles: A Security Throwback Connect Vehicles: A Security Throwback Chris Valasek (@nudehaberdasher) Director of Vehicle Security Research Introduction Hello Chris Valasek Director of Vehicle Security Research IPS Dev -> Windows RE

More information

Through the years we ve come

Through the years we ve come A Closer Look at Vehicle Data Communications A Closer Look at Vehicle Data Communications by Steve Garrett members.atra.com Through the years we ve come to depend on the information we can collect with

More information

Superchips 1705 MAX MicroTuner Ford Powerstroke 7.3L Turbo Diesel Vehicles Vehicle Programming Instructions

Superchips 1705 MAX MicroTuner Ford Powerstroke 7.3L Turbo Diesel Vehicles Vehicle Programming Instructions Page 1 of 12 Form 0126K 10/26/2004 Superchips Inc. Superchips 1705 MAX MicroTuner Ford Powerstroke 7.3L Turbo Diesel Vehicles Vehicle Programming Instructions PLEASE READ THIS ENTIRE INSTRUCTION SHEET

More information

Quick Start Guide Pre-and Post-Scanning.

Quick Start Guide Pre-and Post-Scanning. Quick Start Guide Pre-and Post-Scanning. Learn what is required for each manufacturer OEM position papers and service information requirements www.oem1stop.com Collision Facility Scanning Options 1 2 3

More information

Abrites Diagnostics for Peugeot/Citroën User Manual

Abrites Diagnostics for Peugeot/Citroën User Manual Abrites Diagnostics for Peugeot/Citroën User Manual Version: 1.7 www.abrites.com Manual verion: 1.7 1 List of Revisions Date Chapter Description Revision 19.Oct.2010 ALL First version of the document.

More information

PRIVACY STATEMENT Last Updated: January 1, 2017

PRIVACY STATEMENT Last Updated: January 1, 2017 PRIVACY STATEMENT Last Updated: January 1, 2017 The General Motors Family of Companies (including General Motors Company, OnStar, LLC ( OnStar ), and affiliates) (collectively, "GM" or "we") provides this

More information

Quick Start Guide Pre-and Post Scanning

Quick Start Guide Pre-and Post Scanning Quick Start Guide Pre-and Post Scanning Emerging Technologies Tools Subcommittee Chuck Olsen AirPro Diagnostics Table of Contents Pg- 1) Getting Started, Pre and Post Repair Scanning Pg- 4) Research &

More information

Conquering Complexity: Addressing Security Challenges of the Connected Vehicle

Conquering Complexity: Addressing Security Challenges of the Connected Vehicle Conquering Complexity: Addressing Security Challenges of the Connected Vehicle October 3, 2018 Securely Connecting People, Applications, and Devices Ted Shorter Chief Technology Officer CSS Ted.Shorter@css-security.com

More information

ENABLING SECURE CLOUD CONNECTIVITY. Create a Successful Cloud Strategy with Reliable Connectivity Solutions

ENABLING SECURE CLOUD CONNECTIVITY. Create a Successful Cloud Strategy with Reliable Connectivity Solutions ENABLING SECURE CLOUD CONNECTIVITY Create a Successful Cloud Strategy with Reliable Connectivity Solutions TABLE OF CONTENTS Introduction The Data Storage Conundrum Cloud vs. On-premises: Finding the Right

More information

WHICH PLATFORM For My Website

WHICH PLATFORM For My Website WHICH PLATFORM For My Website CONTENTS INTRODUCTION 1. 3. 4. 5 9. 10. 11. 13. 14. Introduction Your domain name Why choose a CMS platform? Choose the right Content Management System Add features Do you

More information

Disaster Preparedness and Recovery

Disaster Preparedness and Recovery Disaster Preparedness and Recovery Do you have a preparation plan? You probably didn t hesitate to develop a business plan when starting your company to ensure for the growth of your business. Similarly,

More information

Preventing External Connected Devices From Compromising Vehicle Systems Vector Congress November 7, 2017 Novi, MI

Preventing External Connected Devices From Compromising Vehicle Systems Vector Congress November 7, 2017 Novi, MI Preventing External Connected Devices From Compromising Vehicle Systems Vector Congress November 7, 2017 Novi, MI Bob Gruszczynski VWoA OBD Communication Expert Current Cybersecurity Status Challenges

More information

General information Document template...1 Version overview...2. Release Definition and purpose Overview...3

General information Document template...1 Version overview...2. Release Definition and purpose Overview...3 . Legal notice Porsche reserves all rights to this document. This document may not be duplicated or disclosed to third parties without the written approval of Porsche. Porsche does not accept any liability

More information

Preparing your network for the next wave of innovation

Preparing your network for the next wave of innovation Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt

More information

Reprogram Vehicles Using The EASE Universal Reprogrammer II+ & Your PC

Reprogram Vehicles Using The EASE Universal Reprogrammer II+ & Your PC Reprogram Vehicles Using The EASE Universal Reprogrammer II+ & Your PC Do you know that many times reprogramming is the only way to repair a vehicle and eliminate false DTCs? Have you ever stopped working

More information

Paystar Remittance Suite Tokenless Two-Factor Authentication

Paystar Remittance Suite Tokenless Two-Factor Authentication Paystar Remittance Suite Tokenless Two-Factor Authentication Introduction Authentication is the process by which a computer system positively identifies a user It is commonly considered to be one of the

More information

The 10 Disaster Planning Essentials

The 10 Disaster Planning Essentials The 10 Disaster Planning Essentials For A Small Business Network 252 Plymouth Ave. S. Rochester, NY 14608 585-546-4120 info@capstoneitinc.com www.rochestercomputersupport.com The 10 Disaster Planning Essentials

More information

Instant evolution in the age of digitization. Turn technology into your competitive advantage

Instant evolution in the age of digitization. Turn technology into your competitive advantage Instant evolution in the age of digitization Turn technology into your competitive advantage It s easy to underestimate how far we ve come in such a relatively short space of time, and how much the world

More information

The Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio

The Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio Prompt. Courteous. Knowledgeable. Support you deserve. The Value Of NEONet Cybersecurity Why You Need To Protect Your Private Student Data In Ohio 1 TABLE OF CONTENTS 2 2 2-3 4 5 7 Introduction The Three

More information

CryptoEx: Applications for Encryption and Digital Signature

CryptoEx: Applications for Encryption and Digital Signature CryptoEx: Applications for Encryption and Digital Signature CryptoEx Products: Overview CryptoEx Outlook CryptoEx Notes CryptoEx Volume CryptoEx Pocket CryptoEx File CryptoEx Office CryptoEx Business Server

More information

PRODUCT SERVICE INFORMATION

PRODUCT SERVICE INFORMATION PRODUCT SERVICE INFORMATION Document number: P0019 For further technical information regarding testing, repairs or to search for New or Remanufactured Automotive electronic products, please visit www.injectronics.com.au,

More information

IMPORTANT DATES. Friday, January 18 th

IMPORTANT DATES. Friday, January 18 th IMPORTANT DATES Account access will be unavailable for the entire weekend beginning at 6:00 p.m. Internet Banking & Telephone Banking will also be unavailable for the entire weekend beginning at 6:00 p.m.

More information

Back to Main. Trade Show. iscan-ii / D91 Latest Versions (March, 2009)

Back to Main. Trade Show. iscan-ii / D91 Latest Versions (March, 2009) Back to Main Trade Show iscan-ii / D91 Latest Versions (March, 2009) iscan-ii RENAULT V1.02 English/Chinese/Japanese 2009-03-02 iscan-ii CITROEN V1.02 English/Chinese/Japanese 2009-03-02 iscan-ii PEUGEOT

More information

E53 (X5) from 10/04 production with Premium Package (ZPP) or BMW Assist (SA 639)

E53 (X5) from 10/04 production with Premium Package (ZPP) or BMW Assist (SA 639) SI B84 13 04 Phone, Navigation Systems meeknet.co.uk/e64 May 2005 Technical Service This Service Information bulletin supersedes S.I. B84 13 04 dated March 200 designates changes to this revision SUBJECT

More information

Used Delightedly, User-Friendly MARUTI,MAZDA,MITSUBISHI,NISSAN,SUBARU,SUZUKI,TOYOTA, TATA, CHRYSLER, 8

Used Delightedly, User-Friendly MARUTI,MAZDA,MITSUBISHI,NISSAN,SUBARU,SUZUKI,TOYOTA, TATA, CHRYSLER, 8 Shor tcut keys Including CR501/601/611/801/811/821/910/920/981 DTC One-click Reading DTCs ER One-click Clearing DTCs I/M One-click Reading IM Readiness Statu? Tips and Help Car Model Suppor ting (46) Automotive

More information

OASIS TECHNICAL COMMITTEE FORMAT OF AUTOMOTIVE REPAIR INFORMATION

OASIS TECHNICAL COMMITTEE FORMAT OF AUTOMOTIVE REPAIR INFORMATION OASIS TECHNICAL COMMITTEE FORMAT OF AUTOMOTIVE REPAIR INFORMATION Document Control Document Code SC1-014 Author(s) John Chelsom Date 08-01-2003 Version Version 1.0 Notes: This document uses a standard

More information

MOBILITY TRANSFORMING THE MOBILE DEVICE FROM A SECURITY LIABILITY INTO A BUSINESS ASSET E-BOOK

MOBILITY TRANSFORMING THE MOBILE DEVICE FROM A SECURITY LIABILITY INTO A BUSINESS ASSET E-BOOK E -BOOK MOBILITY TRANSFORMING THE MOBILE DEVICE FROM A SECURITY LIABILITY INTO A BUSINESS ASSET E-BOOK MOBILITY 1 04 INTRODUCTION 06 THREE TECHNOLOGIES THAT SECURELY UNLEASH MOBILE AND BYOD TABLE OF CONTENTS

More information

The Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication

The Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication White Paper The Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication Table of contents Introduction... 2 Password protection alone is no longer enough...

More information

2017_Privacy and Information Security_English_Content

2017_Privacy and Information Security_English_Content 2017_Privacy and Information Security_English_Content 2.3 Staff includes all permanent or temporary, full-time, part-time, casual or contract employees, trainees and volunteers, including but not limited

More information

Panda Security 2010 Page 1

Panda Security 2010 Page 1 Panda Security 2010 Page 1 Executive Summary The malware economy is flourishing and affecting both consumers and businesses of all sizes. The reality is that cybercrime is growing exponentially in frequency

More information

Donor Credit Card Security Policy

Donor Credit Card Security Policy Donor Credit Card Security Policy INTRODUCTION This document explains the Community Foundation of Northeast Alabama s credit card security requirements for donors as required by the Payment Card Industry

More information

GARAS Privacy Notice

GARAS Privacy Notice GARAS Privacy Notice At GARAS we are committed to treating everyone with respect which is why we take treating your data seriously. We committed to being clear about how we collect, use and store your

More information

How to Build a Culture of Security

How to Build a Culture of Security How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your

More information

# B: Key Code Security Rules and Information on GM KeyCode Look-Up Application - (Jan 9, 2009)

# B: Key Code Security Rules and Information on GM KeyCode Look-Up Application - (Jan 9, 2009) Page 1 of 11 Document ID: 2221721 #06-00-89-051B: Key Code Security Rules and Information on GM KeyCode Look-Up Application - (Jan 9, 2009) Subject: Key Code Security Rules and Information on GM KeyCode

More information

NISSAN MANUAL CONTENTS APPLICATIONS GENERAL OPERATION SPECIAL FUNCTIONS TIPS & HINTS REMOTE CONTROL PROGRAMMING

NISSAN MANUAL CONTENTS APPLICATIONS GENERAL OPERATION SPECIAL FUNCTIONS TIPS & HINTS REMOTE CONTROL PROGRAMMING NISSAN NISSAN MANUAL CONTENTS APPLICATIONS GENERAL OPERATION SPECIAL FUNCTIONS TIPS & HINTS REMOTE CONTROL PROGRAMMING APPLICATIONS VEHICLE ENG TYPE MODEL YEAR SYSTEM CABLE ALMERA PETROL >2000 NATS 2,3

More information

HITAG-2 programmer Key tool USER MANUAL

HITAG-2 programmer Key tool USER MANUAL HITAG-2 programmer Key tool USER MANUAL Version: 6.4 HITAG-2 PROGRAMMER USER MANUAL Document number 1 Date Sym Description new rev. 23-Feb-2006 id Initial Release 1.0 03-Nov-2006 id Changes in document

More information

SECTION B: Anti-Theft Passive Anti-Theft System (PATS) DIAGNOSIS AND TESTING Procedure revision date: 05/23/2008

SECTION B: Anti-Theft Passive Anti-Theft System (PATS) DIAGNOSIS AND TESTING Procedure revision date: 05/23/2008 SECTION 419-01B: Anti-Theft Passive Anti-Theft System (PATS) 2009 Mustang Workshop Manual DIAGNOSIS AND TESTING Procedure revision date: 05/23/2008 Anti-Theft Special Tool(s) 73III Automotive Meter 105-R0057

More information

A Ready Business rises above infrastructure limitations. Vodacom Power to you

A Ready Business rises above infrastructure limitations. Vodacom Power to you A Ready Business rises above infrastructure limitations Vodacom Power to you Vodacom Business Nigeria Managed Hosted Services Get Ready to free up your business. To succeed in today s world of dramatic

More information

10 Hidden IT Risks That Might Threaten Your Business

10 Hidden IT Risks That Might Threaten Your Business (Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

Instructions & Software Install Version 6.30a (Feb 2018) Copyright 2018 DealerTool.co.uk

Instructions & Software Install Version 6.30a (Feb 2018) Copyright 2018 DealerTool.co.uk DealerTool Instructions & Software Install Version 6.30a (Feb 2018) Copyright 2018 DealerTool.co.uk If you have any problems please email support@dealertool.co.uk Emails will always be responded to within

More information

Search. Smart. Getting. About

Search. Smart. Getting. About Smart Search About Getting like Google, Yahoo and others: Search Engine Optimization (SEO) and Pay-Per-Click (PPC) advertising. SEO typically has a higher longterm ROI while short-term results are seen

More information

ABRITES Diagnostics for Renault/Dacia User Manual

ABRITES Diagnostics for Renault/Dacia User Manual Version: 2.7 www.abrites.com Manual version: 2.7 1 List of Revisions Date Chapter Description Revision 11.11.2008 Release version of the document 1.0 18.03.2009 Update to V1.1 of the software 1.1 17.06.200

More information

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013 Securing Wireless Mobile Devices Lamaris Davis East Carolina University 11/15/2013 Attract As more employees prefer to use mobile devices in the workplace, organizations are starting to adopt the Bring

More information

Help Manual for A3/TT IMMO Key Function.

Help Manual for A3/TT IMMO Key Function. Help Manual for A3/TT IMMO Key Function. Connect OBD adapter to the transponder adapter first, then connect to the machine. PICTURE 1 Connect OBD adapter to the diagnostic socket of the car, choose IMMO

More information

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 PENETRATION TESTING OF AUTOMOTIVE DEVICES Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 Imagine your dream car 2 Image: 2017 ESCRYPT. Exemplary attack demonstration only. This is NOT

More information

Cybersecurity for the SMB. CrowdStrike s Murphy on Steps to Improve Defenses on a Smaller Scale

Cybersecurity for the SMB. CrowdStrike s Murphy on Steps to Improve Defenses on a Smaller Scale Cybersecurity for the SMB CrowdStrike s Murphy on Steps to Improve Defenses on a Smaller Scale The high-profile breaches of Fortune 100 companies are the ones that get the headlines, but small and midsized

More information

Performance Testing BroadR-Reach Automotive Ethernet

Performance Testing BroadR-Reach Automotive Ethernet White Paper Performance Testing BroadR-Reach Automotive Ethernet Key Elements for an Automotive-Specific Ethernet Test Regime Introduction Ethernet has long been the standard for data communication across

More information

SECURING DEVICES IN THE INTERNET OF THINGS

SECURING DEVICES IN THE INTERNET OF THINGS SECURING DEVICES IN THE INTERNET OF THINGS EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including steep financial losses, damage

More information

Acorn Trust Mobile Phone Policy

Acorn Trust Mobile Phone Policy Acorn Trust Mobile Phone Policy Written by: J Buckley, Trust Business Manager Date agreed: 17 th May 2016 Date reviewed: Next Review Date: Summer 2018 Chairs Signature Mission Statement The Acorn Trust

More information

Digital Transformation Drives Distributed Store Networks To The Breaking Point

Digital Transformation Drives Distributed Store Networks To The Breaking Point Digital Transformation Drives Distributed Store Networks To The GET STARTED Overview Forward-looking retailers are realizing the value of cloud- and data center-based applications as they move high-priority

More information

Code Reader 2 User manual

Code Reader 2 User manual Code Reader 2 User manual Table of Contents 1. Setup. 2. Main operations. 3. Database. 4. PIN Calculator. 5. Transponder Catalogue. 6. EEprom Calculator. 7. Special Functions. 8. Transponder Programming.

More information

Verified by VINtrack

Verified by VINtrack Verified by VINtrack VINtrack Software is the only VIN barcode software in the world that catches counterfeits and clones with its unique database. Just ONE stolen vehicle recovery will pay for the unit

More information

Page 1/14

Page 1/14 http://pinblaster.com/buynow_exclusive.php Page 1/14 What is Pin Blaster EXCLUSIVE? Pin Blaster is a major update that we are performing for Pin Blaster. This update will be available only to a few users

More information

SECURING DEVICES IN THE INTERNET OF THINGS

SECURING DEVICES IN THE INTERNET OF THINGS SECURING DEVICES IN THE INTERNET OF THINGS WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including

More information

Technical Communications Systems Overview JLR WEB

Technical Communications Systems Overview JLR WEB Jaguar Land Rover elearning TC-JLR-WEB: Technical Communications Systems Overview JLR WEB Contents Overview 3 Document Details 9 Posting and Notification 13 Electronic Product Quality Reporting (EPQR)

More information

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief Providing Secure Access to Corporate Resources from BlackBerry Devices Leveraging Two-factor Authentication Augmenting the BlackBerry Enterprise Solution BlackBerry devices are becoming ubiquitous throughout

More information

TECHNICAL SERVICE BULLETIN

TECHNICAL SERVICE BULLETIN GROUP ELE NUMBER MODEL 2014MY Soul (PS) DATE 058 March 2014 TECHNICAL SERVICE BULLETIN SERVICE ACTION: BCM UPGRADE - IPM LOGIC This bulletin provides information related to the reprogramming of the Body

More information

PCM4-CAM NTV-KIT750. Overview

PCM4-CAM NTV-KIT750. Overview 3950 NW 120 th Ave, Coral Springs, FL 33065 TEL 561-955-9770 FAX 561-955-9760 www.nav-tv.com info@nav-tv.com PCM4-CAM NTV-KIT750 Overview The PCM4-CAM Kit interfaces a backup camera input (with active

More information

Ranger 900XP Speed Key Installation Digital Wrench Overview

Ranger 900XP Speed Key Installation Digital Wrench Overview Ranger 900XP Speed Key Installation Digital Wrench Overview Make Sure to verify that you have the most current update of Digital Wrench installed. Minimum required Version 3.6 update 07/08/14 Go to: Polaris

More information

Authentication Methods

Authentication Methods CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks

More information

Compliance in 5 Steps

Compliance in 5 Steps Email Compliance in 5 Steps Introduction For most businesses, email is a vital communication resource. Used to perform essential business functions, many organizations rely on email to send sensitive confidential

More information

Uptane. Securing Over-the-Air Updates Against Nation State Actors. Justin Cappos New York University

Uptane. Securing Over-the-Air Updates Against Nation State Actors. Justin Cappos New York University Uptane Securing Over-the-Air Updates Against Nation State Actors Justin Cappos New York University What do these companies have in common? What do these companies have in common? Users attacked via software

More information

Will you be PCI DSS Compliant by September 2010?

Will you be PCI DSS Compliant by September 2010? Will you be PCI DSS Compliant by September 2010? Michael D Sa, Visa Canada Presentation to OWASP Toronto Chapter Toronto, ON 19 August 2009 Security Environment As PCI DSS compliance rates rise, new compromise

More information

NC1701 ENHANCED VEHICLE COMMUNICATIONS CONTROLLER

NC1701  ENHANCED VEHICLE COMMUNICATIONS CONTROLLER NC1701 ENHANCED VEHICLE COMMUNICATIONS CONTROLLER Nebula Systems has created the first dedicated controller for use in Telematics embedded systems, enabling companies in the Connected Car space to access

More information

Why Continuity Matters

Why  Continuity Matters Why Email Continuity Matters Contents What is Email Continuity and Why it Matters........................... 1 Challenges to Email Continuity................................... 2 Increasing Email Management

More information

Why This Major Automaker Decided BlackBerry Cybersecurity Consulting was the Right Road to Protecting its Connected Cars

Why This Major Automaker Decided BlackBerry Cybersecurity Consulting was the Right Road to Protecting its Connected Cars Case Study Why This Major Automaker Decided BlackBerry Cybersecurity Consulting was the Right Road to Protecting its Connected Cars At a Glance Industry Automotive Services BlackBerry Cybersecurity Services

More information

Retail Security in a World of Digital Touchpoint Complexity

Retail Security in a World of Digital Touchpoint Complexity Retail Security in a World of Digital Touchpoint Complexity Author Greg Buzek, President of IHL Services Sponsored by Cisco Systems Inc. Featuring industry research by Previously in part 1 and part 2 of

More information

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT SUBSCRIBER S GUIDE VERSION 1.3 ECB-PUBLIC 15-April-2014 ESCB-PKI - Subscriber's Procedures v.1.3.docx Page 2 of 26 TABLE OF CONTENTS GLOSSARY AND ACRONYMS...

More information

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS? FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit

More information

KIT DESCRIPTION...p.3 SOFTWARE INSTALLATION..p.4 FIRST USE UPDATE.p.5 READING - PROTOCOL IDENTIFICATION.p.6

KIT DESCRIPTION...p.3 SOFTWARE INSTALLATION..p.4 FIRST USE UPDATE.p.5 READING - PROTOCOL IDENTIFICATION.p.6 INDEX KIT DESCRIPTION...p.3 SOFTWARE INSTALLATION..p.4 FIRST USE UPDATE.p.5 READING - PROTOCOL IDENTIFICATION.p.6 - Totally automatic identification system...p.6 - Protocol identification system Brand/Model/Type....p.8

More information

PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)

PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS) PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS) Table of Contents Introduction 03 Who is affected by PCI DSS? 05 Why should my organization comply 06 with PCI DSS? Email security requirements 08

More information

Instruction manual Gulden desktop wallet 1.6.1

Instruction manual Gulden desktop wallet 1.6.1 Instruction manual Gulden desktop wallet 1.6.1 Written by Aat de Kwaasteniet Translated by Arjan Bartlema Edited by amongst others Guldentest Date: 10 12 2016 Introduction Great that you have found your

More information

Uptane: Securely Updating Automobiles. Sam Weber NYU 14 June 2017

Uptane: Securely Updating Automobiles. Sam Weber NYU 14 June 2017 Uptane: Securely Updating Automobiles Sam Weber NYU samweber@nyu.edu 14 June 2017 Credits Funded by DHS S&T CSD Work done by New York University University of Michigan Transportation Research Institute

More information

Why Your Business Needs Enterprise-Strength Password Management

Why Your Business Needs Enterprise-Strength Password Management Why Your Business Needs Enterprise-Strength Password Management White Paper 2017 The Emergence of the Password and Hacking Secret Keys For over a half a century, the password, a secret sequence of characters

More information

SMARTnet provides you with the following advantages:

SMARTnet provides you with the following advantages: SMARTnet Service is an award-winning technical support service that gives you and your IT staff direct, round the clock access to Cisco engineers and extensive Cisco.com resources. Cisco SMARTnet is essential

More information

Roving Reporter: Ringing Up POS System Sales with Intel vpro Technology

Roving Reporter: Ringing Up POS System Sales with Intel vpro Technology Roving Reporter: Ringing Up POS System Sales with Intel vpro Technology By Mark Scantlebury The market for point-of-sale (POS) machines is extremely competitive, but POS machine designers can get an edge

More information

Honda Independent Repair Website User s Guide

Honda Independent Repair Website User s Guide Honda Independent Repair Website User s Guide What is ServiceExpress? ServiceExpress is American Honda s Web-based system for delivering electronic service publications to the aftermarket. In ServiceExpress,

More information

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

Meeting FFIEC Meeting Regulations for Online and Mobile Banking Meeting FFIEC Meeting Regulations for Online and Mobile Banking The benefits of a smart card based authentication that utilizes Public Key Infrastructure and additional mechanisms for authentication and

More information

Data Centers & Technology:

Data Centers & Technology: Data Centers & Technology: Risk in the digital landscape Presented by; Ralph de Mesquita Principal Risk Analyst, Risk Engineering UK Agenda Rise of cloud providers Four scenarios: where are the insurable

More information

Robert Bond. Respecting Privacy, Securing Data and Enabling Trust a view from Europe

Robert Bond. Respecting Privacy, Securing Data and Enabling Trust a view from Europe Respecting Privacy, Securing Data and Enabling Trust a view from Europe Robert Bond, Partner & Notary Public Robert Bond Robert Bond has nearly 40 years' experience in advising national and international

More information